-
3
-
-
31344462815
-
Block ciphers and stream ciphers: The state of the art
-
Belgium
-
A. Biryukov, "Block ciphers and stream ciphers: The state of the art", Technical report, Belgium, 2006. (http://www.esat.kuleuven.ac.be)
-
(2006)
Technical report
-
-
Biryukov, A.1
-
4
-
-
1342306864
-
A symmetric encryption scheme based on 3D chaotic cat maps
-
G. Chen, Y. Mao, and C. K. Chui, "A symmetric encryption scheme based on 3D chaotic cat maps", Chaos, Solutions & Fractals, vol. 21, no. 3, pp. 749-761, 2004.
-
(2004)
Chaos Solutions & Fractals
, vol.21
, Issue.3
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
6
-
-
34247623219
-
An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption
-
H. El-din, H. Ahmed, H. M. Kalash, and O. S. F. Allah, "An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption"', Informatica, vol. 31, pp. 121-129, 2007.
-
(2007)
Informatica
, vol.31
, pp. 121-129
-
-
El-din, H.1
Ahmed, H.2
Kalash, H.M.3
Allah, O.S.F.4
-
7
-
-
84874800178
-
"A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information theory, vol. IT-31, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Information theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
8
-
-
0003508558
-
-
Federal Information Processing Standards Publications (FIPS 197)Nov
-
Federal Information Processing Standards Publications (FIPS 197), Advanced Encryption Standard (AES), Nov. 2001.
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
9
-
-
84944051734
-
Elliptic curve pseudorandom sequence generators
-
LNCS 1758
-
G. Gong, T. A. Berson, D. R. Stinson, "Elliptic curve pseudorandom sequence generators", Proceedings ofthe 6th Annual International Workshop on Selected Areas in Cryptography, LNCS 1758, pp 34-48, 1999.
-
(1999)
Proceedings ofthe 6th Annual International Workshop on Selected Areas in Cryptography
, pp. 34-48
-
-
Gong, G.1
Berson, T.A.2
Stinson, D.R.3
-
10
-
-
84968480565
-
Primitive polynomials over finite fields
-
Oct
-
T. Hansen, G. L. Mullen, "Primitive polynomials over finite fields", Mathematics of Computation, vol. 59, no. 200, pp. 639-643, Oct. 1992.
-
(1992)
Mathematics of Computation
, vol.59
, Issue.200
, pp. 639-643
-
-
Hansen, T.1
Mullen, G.L.2
-
11
-
-
79953894678
-
A digital image encryption algorithm based a composition of two chaotic logistic maps
-
July
-
I. A. Ismail, M. Amin, and H. Diab,"A digital image encryption algorithm based a composition of two chaotic logistic maps", International Journal of Network Security, vol. 11, no. 1, pp. 1-10, July 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.1
, pp. 1-10
-
-
Ismail, I.A.1
Amin, M.2
Diab, H.3
-
13
-
-
1242329960
-
A random number generator based elliptic curve operations
-
L. P. Lee, K. W. Wong, "A random number generator based elliptic curve operations", Computers and Mathematics with Applications, vol. 47, pp. 217-226, 2004.
-
(2004)
Computers and Mathematics with Applications
, vol.47
, pp. 217-226
-
-
Lee, L.P.1
Wong, K.W.2
-
16
-
-
10444257964
-
A novel fast image encryption scheme based on 3D chaotic baker maps
-
Y. Mao, G. Chen and S. Lian, "A novel fast image encryption scheme based on 3D chaotic baker maps", International Journal of Bifurcation and Chaos, vol. 14, no. 10, pp. 3613-3624, 2004.
-
(2004)
International Journal of Bifurcation and Chaos
, vol.14
, Issue.10
, pp. 3613-3624
-
-
Mao, Y.1
Chen, G.2
Lian, S.3
-
18
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
LNCS Springer Verlag
-
V. Miller, "Uses of elliptic curves in cryptography", Advances in Cryptology (Crypto'85), LNCS 218, Springer Verlag, pp. 417-426, 1986.
-
(1986)
Advances in Cryptology (Crypto'85)
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
19
-
-
77956447858
-
A novel pseudo random bit generator for cryptography applications
-
R. Mita, G. Paumba, S. Pennisi, M. Poli, "A novel pseudo random bit generator for cryptography applications", 9th International Conference on Electronic Circuits & Systems, vol. 2, pp. 489-492, 2002.
-
(2002)
9th International Conference on Electronic Circuits & Systems
, vol.2
, pp. 489-492
-
-
Mita, R.1
Paumba, G.2
Pennisi, S.3
Poli, M.4
-
20
-
-
34748887111
-
A new image encryption approach using combinational permutation techniques
-
A. Mitra, Y. V. S. Rao, and S. R. M. Prasanna, "A new image encryption approach using combinational permutation techniques", International Journal of Computer Science, vol. 1, no. 1, pp. 127-131, 2006.
-
(2006)
International Journal of Computer Science
, vol.1
, Issue.1
, pp. 127-131
-
-
Mitra, A.1
Rao, Y.V.S.2
Prasanna, S.R.M.3
-
22
-
-
79955634683
-
A random bit generator using chaotic maps
-
Jan
-
N. K. Pareek, V. Patidar, and K. K. Sud, "A random bit generator using chaotic maps", International Journal of Network Security, vol. 10, no. 1, PP. 32-38, Jan. 2010.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.1
, pp. 32-38
-
-
Pareek, N.K.1
Patidar, V.2
Sud, K.K.3
-
26
-
-
3843081053
-
A statistical test suite for random and pseudorandom number generators for cryptographic applications
-
May 15
-
A. Rukhin et al., "A statistical test suite for random and pseudorandom number generators for cryptographic applications", NIST Special Publication, 800-22, May 15, 2001.
-
(2001)
NIST Special Publication
, pp. 800-822
-
-
Rukhin, A.1
-
27
-
-
51249102657
-
Image encryption algorithm based on chaotic mapping
-
M. Salleh, S. Ibrahim, and I. F. Isnin, "Image encryption algorithm based on chaotic mapping", Journal Teknologi, vol. 39(D), pp. 1-12, 2003.
-
(2003)
Journal Teknologi
, vol.39
, Issue.D
, pp. 1-12
-
-
Salleh, M.1
Ibrahim, S.2
Isnin, I.F.3
-
28
-
-
80054704544
-
Key sequences of elliptic curve points over finite fields, their properties and application in image encryption and decryption
-
Manipal University
-
S. V. Sathyanarayana, "Key sequences of elliptic curve points over finite fields, their properties and application in image encryption and decryption", Ph.D Thesis, Manipal University, 2010.
-
(2010)
Ph.D Thesis
-
-
Sathyanarayana, S.V.1
-
29
-
-
80054680889
-
Design of pseudo random sequence generator based on properties of cyclic elliptic curves over finite fields
-
Taylor & Francis, Online ISSN:1939-3547
-
S. V. Sathyanarayana, M. A. Kumar, K. N. Haribhat, "Design of pseudo random sequence generator based on properties of cyclic elliptic curves over finite fields", Accepted for publication in International Journal of Information Security: Global Perspective, Taylor & Francis, Online ISSN:1939-3547.
-
Accepted for publication in International Journal of Information Security: Global Perspective
-
-
Sathyanarayana, S.V.1
Kumar, M.A.2
Haribhat, K.N.3
-
30
-
-
80054689256
-
Some studies on elliptic curve based stream cipher systems
-
PONDA, Jan
-
S. V. Sathyanarayana, M. A. Kumar, K. N. Haribhat, "Some studies on elliptic curve based stream cipher systems", National Conference at Goa College of Engineering Goa, PONDA, Jan. 2004.
-
(2004)
National Conference at Goa College of Engineering Goa
-
-
Sathyanarayana, S.V.1
Kumar, M.A.2
Haribhat, K.N.3
-
31
-
-
80054709928
-
Generation of pseudorandom sequence over cyclic elliptic curve group and their properties
-
MIT Manipal Dec, 28-30 2007
-
S. V. Sathyanarayana, M. A. Kumar, K. N. Haribhat, "Generation of pseudorandom sequence over cyclic elliptic curve group and their properties", International Conference on Advances in Information and Communication (ICICOT'07), MIT Manipal, pp. 28-30, Dec. 2007.
-
International Conference on Advances in Information and Communication (ICICOT'07)
-
-
Sathyanarayana, S.V.1
Kumar, M.A.2
Haribhat, K.N.3
-
32
-
-
79960696067
-
Generation of pseudorandom sequence over elliptic curve group and their properties
-
S. V. Sathyanarayana, M. A. Kumar, K. N. Haribhat, "Generation of pseudorandom sequence over elliptic curve group and their properties", Journal of Discrete Mathematical Sciences & Cryptography, vol. 10, no. 6, pp. 731-747, 2007.
-
(2007)
Journal of Discrete Mathematical Sciences & Cryptography
, vol.10
, Issue.6
, pp. 731-747
-
-
Sathyanarayana, S.V.1
Kumar, M.A.2
Haribhat, K.N.3
-
33
-
-
0003851399
-
-
John Wiley and Sons, Inc.
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley and Sons, Inc., 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition
-
-
Schneier, B.1
-
34
-
-
77950342061
-
Software implementations of elliptic curve cryptography
-
July
-
Z. J. Shi and H. Yan, "Software implementations of elliptic curve cryptography", International Journal of Network Security, vol. 7, no. 1, pp. 141-150, July 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 141-150
-
-
Shi, Z.J.1
Yan, H.2
-
35
-
-
62849085933
-
A modified AES based algorithm for image encryption
-
May
-
M. Zehid, M. Machhout, L. Khrijji, A. Baganne, and R. Tourki, "A modified AES based algorithm for image encryption", Proceedings of World Academy of Science, Engineering and Technology, vol. 21, pp. 206-211, May 2007.
-
(2007)
Proceedings of World Academy of Science Engineering and Technology
, vol.21
, pp. 206-211
-
-
Zehid, M.1
Machhout, M.2
Khrijji, L.3
Baganne, A.4
Tourki, R.5
|